Korean
<< Back
VID 22568
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its self-reported version number, the instance of Apache Tomcat 7.0 listening on the remote host is earlier than Tomcat 7.0.32 and, therefore, may be affected by a security bypass vulnerability.

An error exists in the file 'filters/CsrfPreventionFilter.java' that can allow cross-site request forgery (CSRF) attacks to bypass the filtering. This can allow access to protected resources without a session identifier.

* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.32
http://seclists.org/fulldisclosure/2012/Dec/74

* Platforms Affected:
Apache Tomcat Server versions prior to 7.0.32
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (7.0.32 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2012-4431 (CVE)
Related URL 56814 (SecurityFocus)
Related URL (ISS)